Abstract
In this paper will be presented a new user-oriented approach for creation of cryptographic protocols dedicated for efficient and secure data sharing and services management. Such new procedures will be proposed with application of mathematical linguistic formalisms and application of personal characteristics, involved in creation of the division and management procedures. Such new protocols can be created with application of different data representation classes. Some possible application will also be described.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Gregg, M., Schneier, B.: Security Practitioner and Cryptography Handbook and Study Guide Set. Wiley, Hoboken (2014)
Laudon, K.C., Laudon, J.P.: Management Information Systems – Managing the Digital Firm, 7th edn. Prentice-Hall International Inc., Cliffs (2002)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Waterloo (2001)
Ogiela, L.: Advanced techniques for knowledge management and access to strategic information. Int. J. Inf. Manage. 35(2), 154–159 (2015)
Ogiela, L.: Cryptographic techniques of strategic data splitting and secure information management. Pervasive Mob. Comput. 29, 130–141 (2016)
Ogiela, L., Ogiela, M.R.: Insider threats and cryptographic techniques in secure information management. IEEE Syst. J. 11(2), 405–414 (2017)
Ogiela, M.R., Ogiela, U.: Secure information splitting using grammar schemes. In: Nguyen, N.T., Katarzyniak, R.P., Janiak, A. (eds.) New Challenges in Computational Collective Intelligence. Studies in Computational Intelligence, vol. 244, pp. 327–336. Springer, Heidelberg (2009)
Ogiela, M.R., Ogiela, U.: Secure information management in hierarchical structures. In: Kim, T., Adeli, H., Robles, R.J., Balitanas, M. (eds.) Advanced Computer Science and Information Technology. Communications in Computer and Information Science, vol. 195, pp. 31–35. Springer, Heidelberg (2011)
Ogiela, U., Takizawa, M., Ogiela, L.: Classification of cognitive service management systems in cloud computing. In: Barolli, L., Xhafa, F., Conesa, J. (eds.) Advances on Broad-Band Wireless Computing, Communication and Applications. BWCCA 2017. Lecture Notes on Data Engineering and Communications Technologies, vol. 12, pp. 309–313. Springer, Heidelberg (2018). https://doi.org/10.1007/978-3-319-69811-3_28
Yan, S.Y.: Computational Number Theory and Modern Cryptography. Wiley, New York (2013)
Acknowledgments
This work has been supported by the National Science Centre, Poland, under project number DEC-2016/23/B/HS4/00616.
This work was supported by JSPS KAKENHI grant number 15H0295.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Ogiela, L., Takizawa, M., Ogiela, U. (2020). User Oriented Protocols for Data Sharing and Services Management. In: Barolli, L., Nishino, H., Enokido, T., Takizawa, M. (eds) Advances in Networked-based Information Systems. NBiS - 2019 2019. Advances in Intelligent Systems and Computing, vol 1036. Springer, Cham. https://doi.org/10.1007/978-3-030-29029-0_13
Download citation
DOI: https://doi.org/10.1007/978-3-030-29029-0_13
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-29028-3
Online ISBN: 978-3-030-29029-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)